CVE-2019-14907

Priority
Description
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x
before 4.11.5 have an issue where if it is set with "log level = 3" (or
above) then the string obtained from the client, after a failed character
conversion, is printed. Such strings can be provided during the NTLMSSP
authentication exchange. In the Samba AD DC in particular, this may cause a
long-lived process(such as the RPC server) to terminate. (In the file
server case, the most likely target, smbd, operates as process-per-client
and so a crash there is harmless).
Assigned-to
mdeslaur
Notes
Package
Source: samba (LP Ubuntu Debian)
Upstream:released (4.11.5,4.10.12)
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):needs-triage
Ubuntu 16.04 LTS (Xenial Xerus):released (2:4.3.11+dfsg-0ubuntu0.16.04.25)
Ubuntu 18.04 LTS (Bionic Beaver):released (2:4.7.6+dfsg~ubuntu-0ubuntu2.15)
Ubuntu 19.10 (Eoan Ermine):released (2:4.10.7+dfsg-0ubuntu2.4)
Ubuntu 20.04 (Focal Fossa):needed
More Information

Updated: 2020-02-05 03:14:41 UTC (commit 33eecc947e5a5d8011f73d8a56dd2486b44db0fd)